Traffic filtering service ensures the availability of a Customer's information system (websites or web services) affected by DDoS attack, which may cause complete or partial unavailability of the web resource..
Traffic filtering service provided by QRATOR ensures the availability of Customer's information system (a website or a web service) affected by a DDoS attack, which may cause complete or partial unavailability of the web resource.
QRATOR traffic filtering service includes:
- filtration of HTTPS traffic (subject to disclosure of SSL certificates).
- analysis of inbound traffic of services using HTTP (including HTTPS services not requiring disclosure of SSL certificates).
- analysis and protection of the service at transport and network level (IP, TCP, GRE, and MPLS).
- admission of traffic arriving from "white listed" IP addresses.
- blocking of traffic arriving from "black listed" IP addresses.
- collection and visualization of statistical data, monthly incident reports generation.
- export of blocked IP address list and expert investigation of DDoS attack for future prosecution by enforcement authorities (on demand).
- DDoS traffic filtration bandwidth is determined by the selected Rate Schedule. Exceeding traffic limit is paid additionally.
Key benefits of QRATOR
- Maximum network training time of 30 minutes.
- QRATOR network consists of an array of interchangeable filtration nodes located at sites of major providers of Russia and West Europe. High resilience of the network makes it possible to remain under a DDoS attack continually and support operation of protected services.
- All QRATOR filtration nodes announce IP address of the protected website using BGP Anycast mechanism. QRATOR developed and operates an intelligent traffic routing policy management system.
- Query classification is based on behavior analysis, simulation of interaction of legitimate users with the protected resource and generation of attack signatures.
- Query blocking is performed only in the event of a problem of the protected resource, which ensures minimal frequency of false responses.
Traffic filtering service provided by Kaspersky Lab ensures the availability of a Customer's information system (websites or web services) affected by DDoS attack, which may cause complete or partial unavailability of the web resource.
Kaspersky Lab's traffic filtering service includes:
- filtration of HTTPS traffic (subject to disclosure of SSL certificates);
- analysis of inbound traffic of services using HTTP (including HTTPS services not requiring disclosure of SSL certificates);
- analysis and protection of services at transport and network level (IP, TCP, GRE, MPLS, etc.);
- admission of traffic arriving from "white listed" IP addresses;
- blocking of traffic arriving from "black listed" IP addresses;
- collection and visualization of statistical data, monthly incident reports generation;
- export of blocked IP address list and expert investigation of DDoS attack for future prosecution by enforcement authorities (on demand);
- 1. Maximum DDoS traffic filtration bandwidth
is limited by the conditions listed below, this traffic does not require additional payment: the service ensures traffic screening of 98% of instances provided DDoS attack does not exceed the limit of
- up to 500 Gb/s – for UDP and ICMP-based attacks;
- up to 20 Gb/s (or 25 mil. data packets/s) – for TCP, IPSEC, GRE and other types of attacks.
Key benefits of the Kaspersky Lab service
- Generation of statistical profile for the traffic of a specific resource, which gives individual protection;
- Geographically distributed components of the service are connected to the Net via heavy-duty communication channels eliminating the possibility of their simultaneous failure in the event of an attack. The service is not dependent on any specific provider, which increases its reliability and resilience;
- Kaspersky Laboratory possesses vast experience in combating bot nets, which from the prerequisite for any major DDoS attack. Kaspersky's framework includes a team studying and counteracting zombie nets to provide Kaspersky up-to-the minute information on the methods used by intruders and enable effective counteraction;
- System components employ a variety of static, signature, behavioral and other methods of traffic filtering making it possible to protect resources even from complex intelligent attack, which might defeat other defenses.
- The system includes the function of attack detection using SENSORs located in close proximity to the protected resource allowing to react to any traffic variations immediately (statistical profile of customer's traffic is analyzed instead of traffic itself).
"By way of completing this form, by my own will and in my interests I give my consent to Stack Group, Limited Liability Company (OGRN 1137746371487) located at the address: 125319, Moscow, 6 Bolshoi Koptevsky Proyezd, premise IV, room 16, for the processing of my personal data for the purpose of communication with potential consumers of services and the products of the company.
My personal data, in respect of which this consent is being given, includes last name, first name, patronymic, job position, contact telephone number, e-mail address, company name.
Actions with my personal data, for which I give this consent, include, without limitation: collection, recording, systematization, accumulation, storage in the personal data information system, clarification (update, modification), extraction, use, depersonalization, blocking, deletion, destruction of personal data using automation aids or without the use of such aids, and other actions stipulated by the applicable legislation of the Russian Federation and required for the implementation of the aforementioned purpose of processing, as well as the transfer of personal data to any third parties, to which Stack Group, LLC, transfers the respective personal data in order to achieve the aforementioned objectives, subject to ensuring safety by these persons as to the aforementioned personal data, including their cross-border transfer to the countries that are parties to the Convention of the Council of Europe on the protection of private individuals with regard to automatic processing of personal data.
The Consent shall be valid for five years and shall terminate upon the occurrence of any of the following events: withdrawal of the consent to the processing of personal data, implementation of the objectives of personal data processing, upon expiration of the timeframes for personal data processing.
The fact of confirmation of the aforementioned is the mark in the field "Consent to the processing of personal data" before sending the data from the form".